Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
暂无分享,去创建一个
Reza Fotohi | Mehdi Yusefi | Shahram Zandiyan | Kobra Mabodi | Leili Irankhah | Reza Fotohi | Mehdi Yusefi | Kobra Mabodi | Shahram Zandiyan | Leili Irankhah
[1] AirehrourDavid,et al. Secure routing for internet of things , 2016 .
[2] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[3] Reza Fotohi,et al. Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..
[4] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[5] Sanjay Kumar Dhurandher,et al. An Asymmetric RSA-Based Security Approach for Opportunistic IoT , 2018, WIDECOM.
[6] Jiong Jin,et al. Cyber security framework for Internet of Things-based Energy Internet , 2018, Future Gener. Comput. Syst..
[7] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .
[8] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[9] Tao Qin,et al. IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.
[10] Dan Deng,et al. Intelligent Secure Communication for Internet of Things With Statistical Channel State Information of Attacker , 2019, IEEE Access.
[11] Shahram Behzad,et al. An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..
[12] Ioannis Papaefstathiou,et al. SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.
[13] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[14] Devesh C. Jinwala,et al. Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).
[15] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[16] Isaac Woungang,et al. T_CAFE: A Trust based Security approach for Opportunistic IoT , 2019, IET Commun..
[17] N. Bhalaji,et al. A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol , 2019, ICICCT - 2019.
[18] Sayan Kumar Ray,et al. A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .
[19] Ashutosh Sharma,et al. A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology , 2019, Ad Hoc Networks.
[20] Reza Fotohi,et al. An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.
[21] Daniele Miorandi,et al. REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.
[22] Shahram Behzad,et al. Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .
[23] Tricha Anjali,et al. Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network , 2020, Journal of Applied Security Research.
[24] Roger Woods,et al. Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.
[25] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[26] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[27] Reza Fotohi,et al. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.
[28] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[29] Reza Fotohi,et al. An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .
[30] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[31] Wenyuan Xu,et al. Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks , 2019, 2019 Chinese Control Conference (CCC).
[32] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[33] Shahram Jamali,et al. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .
[34] Cristina Alcaraz. Security and Privacy Trends in the Industrial Internet of Things , 2019, Advanced Sciences and Technologies for Security Applications.
[35] Mauro Conti,et al. SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[36] G. Geethakumari,et al. Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).